CYCON Security Ltd.
Benji Ender is a seasoned professional in the field of cybersecurity, currently serving as the Incident Response & Threat Intelligence Team Leader at CYCON Security Ltd. and as an Incident Management Specialist at INTENSITY Global Group since February 2023. Prior to these roles, Benji worked at EPAM Systems from March 2021 to February 2023 as a Cyber Defense Incident Responder & Threat Hunter, focusing on cloud-based cyber incidents and cyber intelligence gathering. Benji also served as a Security Auditor at White-Hat in early 2021, assessing application systems and on-premises infrastructures for compliance with cybersecurity best practices. Benji is pursuing a Bachelor of Science in Computer Science at the Holon Institute of Technology and has previously completed a degree in Ethical Hacking, Cyber/Computer Forensics, and Counterterrorism at HackerU. Benji holds a High School Diploma from Hadash.
This person is not in any teams
CYCON Security Ltd.
CYCON Security is a cyber security company that develops an automated IR product that gives the possibility to see the whole story of the attack from the beginning to the end: 1. Intelligence Gathering: How a hacker sees the organization from the outside by collecting intelligence from the Dark Net and attacker's forums to identify leaked user's credentials and confidential information. 2. Endpoints and Servers Investigation: An anomaly investigation in the endpoints/servers to identify suspicious behavior that runs in real-time. The CYCON-IO platform knows how to identify unknown behavior and malicious code on endpoints/servers and gives an indication of the source of the attack. 3. Network communication: Identifying suspicious communication between computers/servers and outgoing and incoming communication. The expertise of the CYCON-IO platform makes it possible to automatically identify and block suspicious communication against malicious IP addresses. Our Experience : Defensive * IR - Incident Response. * Cyber Intelligence. * Vulnerability Assessment. * Cyber Training. Offensive ( Prevetative ) * Tactical Intelligence - Offensive. * Red Team. * Blue Team. * Penetration Testing - Application/ Infrastructure. * Threat Modelling. * Cyber Threat Intelligence ( CTI ) Strategic * Compliance & Regulation. * Proofs Of Concept. * Assess New Technology. * Policy & Procedure Writing. * Remediation Work Plan.